Static task
static1
Behavioral task
behavioral1
Sample
4abbdf70e1e66402d4039a56fe2acd51e666f75280f80a81804bd715260bb91d.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
4abbdf70e1e66402d4039a56fe2acd51e666f75280f80a81804bd715260bb91d.exe
Resource
win10v2004-20230220-en
General
-
Target
4abbdf70e1e66402d4039a56fe2acd51e666f75280f80a81804bd715260bb91d.zip
-
Size
1.3MB
-
MD5
8fd6136dfc1e57a87e6f9e7130c795d1
-
SHA1
cbc4c3b9d0ce83c802aab6df906324a26d0b7549
-
SHA256
dfbc4c7dfa47c5a356e1aab583eb57fe0732bd938f5fc0c38124e14b65c45ff6
-
SHA512
5dda3657753bfa5ce7b8f24daddf6c3d0ec2e635fe92c29845bef01f0f1b3c1ba456dd3232c9e912445f48e38afeb2cb610cf71b5e8f95578181568a82dc202d
-
SSDEEP
24576:dtGIrIZQISEueFTaO5aKsVWZDFr8bc/+osyjnXmbAQG:dtGqIZ5SRga3Bc1dmLHyyG
Malware Config
Signatures
Files
-
4abbdf70e1e66402d4039a56fe2acd51e666f75280f80a81804bd715260bb91d.zip.zip
Password: infected
-
4abbdf70e1e66402d4039a56fe2acd51e666f75280f80a81804bd715260bb91d.exe.exe windows x86
Password: infected
4a43ef13050d45ae61812b2997033821
Code Sign
06:a1:3a:55:e1:54:39:ed:2a:1a:49:79:0d:4a:72:89Certificate
IssuerCN=RapidSSL Global TLS RSA4096 SHA256 2022 CA1,O=DigiCert\, Inc.,C=USNot Before22/12/2022, 00:00Not After04/01/2024, 23:59SubjectCN=*.estreet.com7b:05:b1:d4:49:68:51:44:f7:c9:89:d2:9c:19:9d:12Certificate
IssuerCN=VeriSign Universal Root Certification Authority,OU=VeriSign Trust Network+OU=(c) 2008 VeriSign\, Inc. - For authorized use only,O=VeriSign\, Inc.,C=USNot Before12/01/2016, 00:00Not After11/01/2031, 23:59SubjectCN=Symantec SHA256 TimeStamping CA,OU=Symantec Trust Network,O=Symantec Corporation,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
7b:d4:e5:af:ba:cc:07:3f:a1:01:23:04:22:41:4d:12Certificate
IssuerCN=Symantec SHA256 TimeStamping CA,OU=Symantec Trust Network,O=Symantec Corporation,C=USNot Before23/12/2017, 00:00Not After22/03/2029, 23:59SubjectCN=Symantec SHA256 TimeStamping Signer - G3,OU=Symantec Trust Network,O=Symantec Corporation,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
df:16:75:82:a7:78:10:45:fd:4e:4b:57:15:ce:1d:44:22:e7:78:55:3f:75:7e:0d:7f:20:31:fd:6d:2c:14:ebSigner
Actual PE Digestdf:16:75:82:a7:78:10:45:fd:4e:4b:57:15:ce:1d:44:22:e7:78:55:3f:75:7e:0d:7f:20:31:fd:6d:2c:14:ebDigest Algorithmsha256PE Digest MatchestrueSignature Validations
TrustedfalseVerification
Signing CertificateCN=*.estreet.com20/02/2023, 19:26 Valid: false
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetOEMCP
TlsSetValue
VirtualProtect
SetLastError
GetCommandLineW
lstrlenW
GetSystemDefaultUILanguage
lstrlenA
lstrcmpA
GetModuleHandleA
GetLocaleInfoA
GetACP
GetCommandLineA
IsValidCodePage
LoadLibraryA
GetCurrentProcessId
GetProcessHeap
GetStringTypeW
GetTickCount
WriteConsoleW
ReadConsoleW
ReadFile
SetEndOfFile
SetFilePointerEx
HeapReAlloc
HeapSize
GetConsoleMode
GetConsoleOutputCP
FlushFileBuffers
CreateFileW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
RtlUnwind
GetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsFree
FreeLibrary
GetProcAddress
LoadLibraryExW
RaiseException
ExitProcess
GetModuleHandleExW
GetStdHandle
WriteFile
GetModuleFileNameW
HeapFree
CloseHandle
HeapAlloc
FindClose
FindFirstFileExW
FindNextFileW
GetCPInfo
MultiByteToWideChar
WideCharToMultiByte
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetStdHandle
GetFileType
LCMapStringW
DecodePointer
user32
GetDlgCtrlID
GetDoubleClickTime
TrackPopupMenu
GetClassInfoA
GetDesktopWindow
GetWindowTextLengthA
GetParent
GetMessageTime
shell32
ShellExecuteA
Sections
.text Size: 1.5MB - Virtual size: 1.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 33KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 921KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ